Table 36: Attack Pattern Syntax; Table 37: Attack Pattern Syntax Example Matches - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
348

Table 36: Attack Pattern Syntax

Pattern
Direct binary match (octal)
Direct binary match (hexadecimal)
Case insensitive matches
Match any symbol
Match 1 or more symbols
Match 0 or 1 symbols
Grouping of expressions
Alternation, typically used with ( )
Character range
Negation of range
NOTE: Regular expression support is provided by the PCRE library package, which is
open source software, written by Philip Hazel, and copyright by the University of
Cambridge, England.
Table 37 on page 348 lists some example syntax matches.

Table 37: Attack Pattern Syntax Example Matches

This syntax
Matches
\X01 86 A5 00 00\X
the five specified bytes verbatim
(hello|world)
hello or world
(hello|world) +
hello or world one or more times
\[hello\]
hello in a case insensitive manner
Syntax
\0<octal-number>
\X<hexadecimal-number>\X
\[<character-set\]
.
*
?
()
|
[<start>-<end>]
[^<start>-<end>]
Example
01 86 A5 00 00
hello
world
helloworld
world hello
hellohello
hElLo
HEllO
heLLO
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents